Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9712: CWE-434 Unrestricted Upload of File with Dangerous Type in Ivanti Endpoint Manager

0
High
VulnerabilityCVE-2025-9712cvecve-2025-9712cwe-434
Published: Tue Sep 09 2025 (09/09/2025, 15:09:05 UTC)
Source: CVE Database V5
Vendor/Project: Ivanti
Product: Endpoint Manager

Description

Insufficient filename validation in Ivanti Endpoint Manager before 2024 SU3 SR1 and 2022 SU8 SR2 allows a remote unauthenticated attacker to achieve remote code execution. User interaction is required.

AI-Powered Analysis

AILast updated: 09/17/2025, 01:15:57 UTC

Technical Analysis

CVE-2025-9712 is a critical vulnerability classified under CWE-434, which pertains to the unrestricted upload of files with dangerous types. This vulnerability affects Ivanti Endpoint Manager versions prior to 2024 SU3 SR1 and 2022 SU8 SR2. The root cause is insufficient filename validation, allowing a remote unauthenticated attacker to upload malicious files that can lead to remote code execution (RCE) on the targeted system. The attack vector is network-based (AV:N), requiring no privileges (PR:N), but it does require user interaction (UI:R), such as a user clicking a malicious link or uploading a file. The vulnerability impacts confidentiality, integrity, and availability, as successful exploitation can lead to full system compromise. The CVSS v3.1 score is 8.8 (high severity), reflecting the ease of exploitation combined with the severe impact. Although no known exploits are currently reported in the wild, the vulnerability's nature and high CVSS score indicate a significant risk if weaponized. Ivanti Endpoint Manager is widely used for IT asset management and endpoint security, making this vulnerability particularly critical for organizations relying on this product for endpoint control and patch management. The lack of patch links suggests that fixes may be pending or not yet publicly available, emphasizing the need for immediate mitigation steps.

Potential Impact

For European organizations, the impact of CVE-2025-9712 could be severe. Ivanti Endpoint Manager is commonly deployed in enterprises for managing endpoints, software distribution, and security compliance. Exploitation could allow attackers to execute arbitrary code remotely, potentially leading to data breaches, disruption of IT operations, and lateral movement within networks. This could compromise sensitive personal data protected under GDPR, leading to regulatory penalties and reputational damage. The requirement for user interaction means phishing or social engineering campaigns could be used to trigger the exploit, increasing the attack surface. Additionally, compromised endpoints could be used as footholds for ransomware or espionage campaigns targeting critical infrastructure, financial institutions, healthcare providers, and government agencies across Europe. The high severity and broad impact on confidentiality, integrity, and availability make this vulnerability a significant threat to European organizations relying on Ivanti Endpoint Manager for endpoint security and management.

Mitigation Recommendations

1. Immediate mitigation should include restricting file upload capabilities to trusted users only and implementing strict input validation and sanitization on filenames and file types at the application level. 2. Deploy network-level controls such as web application firewalls (WAFs) to detect and block suspicious file upload attempts targeting Ivanti Endpoint Manager interfaces. 3. Educate users about the risks of interacting with unsolicited links or files, emphasizing caution to reduce the likelihood of user interaction required for exploitation. 4. Monitor endpoint manager logs and network traffic for unusual activity indicative of exploitation attempts, including unexpected file uploads or execution of unauthorized code. 5. Coordinate with Ivanti support to obtain patches or updates as soon as they are released and prioritize their deployment in the environment. 6. Consider isolating or segmenting systems running Ivanti Endpoint Manager to limit potential lateral movement in case of compromise. 7. Implement multi-factor authentication (MFA) and least privilege principles to reduce the attack surface and limit unauthorized access.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ivanti
Date Reserved
2025-08-29T23:03:23.691Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c0456a12a58f153632f082

Added to database: 9/9/2025, 3:19:06 PM

Last enriched: 9/17/2025, 1:15:57 AM

Last updated: 10/30/2025, 2:09:54 PM

Views: 67

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats